SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

A review of human-and computer-facing url phishing features

K Althobaiti, G Rummani… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
When detecting phishing websites, both humans and computers rely on aspects of the
website (features) to aid in their decision making. In this work, we conduct a review of URL …

An in-depth benchmarking and evaluation of phishing detection research for security needs

A El Aassal, S Baki, A Das, RM Verma - Ieee Access, 2020 - ieeexplore.ieee.org
We perform an in-depth, systematic benchmarking study and evaluation of phishing features
on diverse and extensive datasets. We propose a new taxonomy of features based on the …

GramBeddings: a new neural network for URL based identification of phishing web pages through n-gram embeddings

AS Bozkir, FC Dalgic, M Aydos - Computers & Security, 2023 - Elsevier
There has been ever-growing use of Internet and progress within many communication
channels such as social media and this escalates the need for rapid and low source …

PDGAN: Phishing detection with generative adversarial networks

S Al-Ahmadi, A Alotaibi, O Alsaleh - Ieee Access, 2022 - ieeexplore.ieee.org
Phishing is a harmful online attack that could lead to identity theft and financial damages.
The demand for high-accuracy phishing detection tools has risen due to the increase of …

Phishing URL detection with oversampling based on text generative adversarial networks

A Anand, K Gorde, JRA Moniz, N Park… - … Conference on Big …, 2018 - ieeexplore.ieee.org
The problem of imbalanced classes arises frequently in binary classification tasks. If one
class outnumbers another, trained classifiers become heavily biased towards the majority …

An effective and secure mechanism for phishing attacks using a machine learning approach

G Mohamed, J Visumathi, M Mahdal, J Anand… - Processes, 2022 - mdpi.com
Phishing is one of the biggest crimes in the world and involves the theft of the user's
sensitive data. Usually, phishing websites target individuals' websites, organizations, sites …

Using lexical features for malicious URL detection--a machine learning approach

A Joshi, L Lloyd, P Westin, S Seethapathy - arXiv preprint arXiv …, 2019 - arxiv.org
Malicious websites are responsible for a majority of the cyber-attacks and scams today.
Malicious URLs are delivered to unsuspecting users via email, text messages, pop-ups or …

Collecting indicators of compromise from unstructured text of cybersecurity articles using neural-based sequence labelling

Z Long, L Tan, S Zhou, C He… - 2019 international joint …, 2019 - ieeexplore.ieee.org
Indicators of Compromise (IOCs) are artifacts observed on a network or in an operating
system that can be utilized to indicate a computer intrusion and detect cyber-attacks in an …

Efficient Classification of Malicious URLs: M-BERT-A Modified BERT Variant for Enhanced Semantic Understanding

B Yu, F Tang, D Ergu, R Zeng, B Ma, F Liu - IEEE Access, 2024 - ieeexplore.ieee.org
Malicious websites present a substantial threat to the security and privacy of individuals
using the internet. Traditional approaches for identifying these malicious sites have …